Windows TCP/IP vulnerability could allow escalation of privilege
Report ID: MS201205004
Date Published: 9 May 2012
Compromise Type: security-bypass privilege-escalation
Compromise From: local-network local-system
Windows Server 2008
Windows Server 2008 R2
Two vulnerabilities reported in Microsoft Windows could allow security bypass and escalation of privilege on an affected system.
Microsoft has released a security update to address two reported vulnerabilities in Microsoft Windows. The first vulnerability was caused by Windows Firewall's failure to properly filter outbound broadcast packets. Upon successful exploit, it could allow an attacker to bypass Windows Firewall to facilitate the exploitation of other vulnerabilities.
The second reported vulnerability could allow an attacker to execute arbitrary code with escalated privileges. It was caused by Windows TCP/IP stack's failure to properly handle the binding of an IPv6 address to a local interface.
The two issues have been fixed in the latest security update for Microsoft Windows. The update introduces modifications in the way that Windows Firewall handles outbound broadcast packets, and the way that Windows TCP/IP handles the binding of an IPv6 address to a local interface. Users are recommended to install this update as a protection measure against potential exploit attempts.
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms12-032)